Methods and apparatuses for monitoring and configuring remote sub-systems using a feed
Methods and apparatuses are presented for managing remote computers that are separated from their manager by a firewall. In one or more embodiments, the apparatus includes one or more computer sub-systems managed by the remote manager. Each sub-system includes a processor and a communication interface coupled to the processor, where the communication interface is further coupled to the remote manager via a network. A firewall is implemented between each sub-system and the remote manager such that the firewall blocks accesses to the sub-system from the remote manager. Notwithstanding the presence of the firewall, and without an specific routing through the firewall, each sub-system receives configuration commands from the remote manager through as a text feed.
Latest Oracle Patents:
- System And Method For Recording User Actions And Resubmitting User Actions For A Graphical User Interface
- Providing Secure Wireless Network Access
- ONBOARDING OF CUSTOMERS FROM SINGLE TENANT TO MULTI-TENANT CLOUD-NATIVE INTEGRATION SERVER
- DISTANCE-BASED LOGIT VALUES FOR NATURAL LANGUAGE PROCESSING
- TRAINING DATA COLLECTION AND EVALUATION FOR FINE-TUNING A MACHINE-LEARNING MODEL FOR AUTOMATIC SOAP NOTE GENERATION
This application is related to U.S. Nonprovisional patent application Ser. No. 12/178,398, entitled “Methods and Apparatuses for Remote Caching,” filed on the same date as the instant application and incorporated by reference as if set forth in full below.
BACKGROUNDComputers are ubiquitous in today's society. They come in all different varieties and can be found in places such as automobiles, the grocery store, banks, personal digital assistants, cell phones, as well as in many businesses. As will be appreciated by almost anyone owning a computer, computers often need to be configured and re-configured for various reasons. For example, a computer may need to have all of the hardware drivers updated because the computer manufacturer has made new drivers available. Alternatively, a computer system may need to have its operating system updated.
In a company environment, sometimes called an “enterprise” scenario, the company may have hundreds or thousands of computers all of which will need to be updated from time to time. People typically referred to as “system administrators” or the like are often employed by these companies, where the primary responsibility of the system administrator may be updating all the computers within an organization. Additionally, system administrators are often tasked with ensuring that the computers continue to operate properly. In an organization that includes hundreds or thousands of computers, the task of monitoring various configuration details and monitoring the computers' operational status can be daunting. This problem is only exacerbated when the company's computers are spread out all over the world in different geographic locations.
While a company's remote systems may be monitored and configured by the system administrator, if the remote computers and the system administrator are connected via the Internet, firewalls are often implemented to prevent access by hackers with surreptitious motives. Because of these firewalls, specific routing through the firewall is often required to allow the system administrator remote access. This specialized routing not only compromises the integrity of the firewall by providing a potential access point for hackers, it also may require additional effort on behalf of the system administrator of making specialized and often customized changes to the firewall, such changes might be done remotely or involve the additional burden of traveling to some or all remote locations.
Remote computer management of systems that are located all over the world also can be very slow and time consuming. For example, if a system administrator simply wants to determine, for each of the hundreds or thousands of systems being managed, which operating system they are running, he would have to issue a command to each of the remote computers and wait for a response, including the latency associated with each of the remote computers.
Thus, a remote monitoring and configuration system is needed that addresses one or more of these problems.
SUMMARYSome embodiments include a computer sub-system that is capable of being managed by a remote manager. The computer sub-system may include a processor, a communication interface coupled to the processor where the communication interface communicates with the remote manager via a network. The network may have a firewall implemented between the sub-system and the remote manager to block accesses to the sub-system from the remote manager. The sub-system receives commands from the remote manager without routing through the firewall using a configurable feed.
Other embodiments include a method for configuring one or more remote sub-systems interacting with a remote manager. The method includes the act of restricting commands to the one or more remote sub-systems from the remote manager using a firewall, posting one or more commands to configure the one or more sub-systems to a configurable feed using the remote manager, and reading the feed with a client manager that is coupled between the one or more sub-systems and the remote manager. The method further includes determining, with the client manager, whether the feed contains a command intended for the one or more sub-systems that it is coupled to, and directing the command intended for the one or more sub-systems to the intended sub-system.
In still other embodiments, a remote computer management system is implemented including a remote manager, a managed system coupled to the remote manager via a firewall, where the firewall is configured to disallow commands to be transmitted from the remote manager to the managed system. The remote computer management system further includes a configurable feed coupled to the remote manager, where the remote manager posts commands for the managed system to the configurable feed through the firewall in text format.
For a detailed description of the various embodiments of the invention, reference will now be made to the accompanying drawings, in which:
The use of the same reference symbols in different drawings indicates similar or identical items.
DETAILED DESCRIPTIONManaged system further includes one or more sub-systems 35A-35D and remote manager 15 is, in one example, configured to control various aspects of sub-systems 35A-35D via network 25. Sub-systems 35A-35D may be any type of hardware requiring periodic maintenance, such as a Sun Server Machine (e.g., Sun Blade 8000), a printer, a network interface card, a wireless email device, etc. Sub-systems 35A-35D may also be uniquely software entities such as applications and software services, where the particular hardware that the software is residing on is not required to be managed as one of subsystems 35A-35D.
Aspects of sub-systems 35A-35D that may be controlled by remote manager 15 include (but are not limited to) controlling particular software loaded on sub-systems 35A-35D, rebooting sub-systems 35A-35D, installing software patches, monitoring operating conditions for each of the sub-systems 35A-35D, such as temperature, fan speed, processor load, disk read/write failures, network loads, service levels, etc. In one or more embodiments, remote manager 15 and sub-systems 35A-35D are located in separate geographic locations and remote manager 15 provides remote control of the various aspects of sub-systems 35A-35D. As such, one entity may own and operate managed system 20 while a separate entity owns and operates remote manager 15. Thus, the owner of managed system 20 may delegate responsibility for the day-to-day system administration tasks of sub-systems 35A-35D to a separate entity that specializes in such administration.
As mentioned previously, firewall 30 blocks certain outside accesses that may occur via network 25, including information coming from remote manager 15. Remote management protocols, such as simple network management protocol (SNMP), remote management invocation (RMI), and Java management extensions (JMX) are methods for performing remote management across the network, but in conventional implementations, they all require firewall 30 to be configured as “fully routed” between sub-systems 35A-35D and remote manager 15 by opening up specific management ports in the firewall configuration. For example, fully routing may include modifying one or more router tables to specifically configure a port for specific administrative commands. Furthermore, firewall 30 may in any case prevent direct communication between remote manager 15 and sub-systems 35A-35D because managed system 20 may present itself to the Internet as a single IP address and translates internal IP addresses for sub-systems 35A-35D (also known as network address translation).
Notwithstanding the complications created by firewall 30, system 10 achieves remote management of sub-systems 35A-35D by sending management details within a configurable channel feed 40 between remote manager 15 and one or more items on the other side of firewall 30 that monitors feed 40. Feed 40 includes configuration details and commands to be performed by sub-systems 35A-35D. In one or more embodiments, feed 40 is posted by remote manager 15 to a web server 42 that is then read and parsed by a client manager 45. Web server 42 may be located on either side of firewall 30.
In one or more embodiments, client manager 45 is located on the same side of firewall 30 as sub-systems 35A-35D and is operable to read and parse the data in feed 40 asynchronous to the actions of remote manager 15. Hence, remote manager 15 may distribute commands (for example via feed 40) to sub-systems 35A-35D regardless of whether sub-systems 35A-35D are otherwise engaged in other actions at the time remote manager 15 distributes its commands for sub-systems 35A-35D. Once data in feed 40 is parsed by client manager 45, client manager 45 directs one or more of sub-systems 35A-35D according to the commands included in feed 40. Accordingly, configuration details and commands for sub-systems 35A-35D channel come through firewall 30 just as any other source of data via the Internet without special configuration of firewall 30 or without remote manager 15 needing to know the precise IP address of a particular sub-system. It is certainly possible to provide special firewall configurations and include IP address information, but such is not required.
Feed 40 may take many forms, and in one or more embodiments, is in the extensible markup language (XML) format, thereby allowing data to be posted to web server 42 and exchanged between remote manager 15, client manager 45, and sub-systems 35A-35D regardless of their particular operating systems. For example, feed 40 in XML form may be read by client manager 45 with a web browser using normal hyper-text transfer protocol (http), or alternatively, in secure hyper-text transfer protocol (https) if feed 40 is implemented in secure form. Furthermore, in one or more embodiments, configurable channel feed 40 is implemented by remote manager 15 in an XML syndication format, such as the really simple syndication (RSS) or ATOM feed formats. XML syndication formats are typically used to aggregate and rapidly scan information from blogs, news and current event Web sites, and other Web sites that update content frequently. By posting feed 40 to a website in an XML syndication format, client manager 45 may aggregate and rapidly scan configuration details and commands posted by remote manager 15 using a simple web reader, such as Google Reader or the like. For example, client manager 45 may dedicate a single thread to reading the header information from feed 40 and determine if client manager 45 has the appropriate handler for the particular protocol from feed 40. If client manager 45 does not have the appropriate handler for the protocol specified in feed 40, then client manager 45 may handoff the command to one of sub-systems 35A-35D. Notably, this does not require specialized software to be loaded on sub-systems 35A-35D, client manager 45, or remote manager 15. Furthermore, the information conveyed is human-readable and may be displayed on a user interface 50.
Once client manager 45 parses feed 40 it takes appropriate action by implementing configuration details and/or commands on sub-systems 35A-35D and then posts the results as an update to the corresponding entry on feed 40 in XML format. In this manner, entries in feed 40 not only contain commands and/or configuration details in human-readable XML format, but it also contains the results of client manager 45 executing these details. A system administrator from managed system 20 can easily review feed 40 via user interface 50 and determine not only the commands and configuration details from remote manager 15 but also the results of client manager 45 attempting to implement them (e.g., successful, error message, pending, etc.). Alternatively, the feed 40 may be reviewed automatically without a system administrator, e.g., using software. Successfully fulfilled execution sequences may be moved off feed 40 and archived, being made available through an archived version of feed 40. User interface 50 may be located within managed system 20, or alternatively, may be located outside managed system 20 without impacting its operation.
In some embodiments, interpreting the counter value (shown in block 90) will include monitoring how the counter value changes over time. For example, if the counter value continually increases each time client manager 45 checks for activity, then this indicates that client manager 45 need not adjust the number of times it reads feed 40 in block 95. Alternatively, if the counter value continually decreases each time client manager 45 checks for activity, then this indicates that client manager 45 can reduce the number of times it reads feed 40 to reduce the load on network 25.
In other embodiments, client manager 45 may obtain information as to how often it should read feed 40 from information contained within feed 40 itself. For example, remote manager 15 may inform client manager 45 that it will update the content of feed 40 every twenty four hours at six o'clock in the morning, and therefore, client manager 45 would not need to consume bandwidth over network 25 by continually checking feed 40 at times not specified by remote manager 15.
In still other embodiments, remote manager 15 and client manager 45 may operate in lock step fashion to conserve bandwidth over network 25. For example, remote manager 15 may instruct client manager 45 to reboot sub-system 35A and then return and report to remote manager 15 via feed 40 upon completion of the reboot. By operating in this manner, remote manager 15 and client manager 45 would not need to consume bandwidth over network 25 by continually checking via feed 40 for further instructions regarding sub-system 35A. Instead, client manager 45 could wait for sub-system 35A to complete its reboot and communicate with remote manager 15 via feed 40 for further instructions.
Some embodiments include methods and apparatuses that allow caching and data persistence in Java management protocols such that network traffic may be minimized. For example, a JMX Connector client may be coupled between the client and server of a JMX connection such that no changes in the client or server code need to be implemented other than directing the client and server to the JMX Connection's service uniform resource locator (URL) to indicate a cached connection.
The managed system 300 may further include one or more communication adaptors 310 that allow the management servers 305 to couple to one or more management applications 315. The management applications 315 may be clients of the management servers 305 and include graphical user interfaces and/or command line interfaces. In the event that the management applications 315 include graphical user interfaces, a system administrator 320 may request information of objects within the control of the management servers 305.
Management servers 305 may include a registry for objects, within the managed system 300, that are exposed to management operations. Examples include CPU utilization, disk usage, online status, network usage, and/or model number of the CPU to name but a few. Objects registered with the management server may become visible to the one or more management applications 315 that request these management operations, but only to the extend allowed by the management server 305. For example, in some embodiments, the management server may be an MBean-type server if the managed system 300 is a JMX system. In this example, the MBean server may only expose the management application 315 to its own management interface rather than the management interface of the object it references.
In some embodiments, the management applications 315 may execute on a separate JVM than the management servers 305 separated by a network connection 325. The network connection 325 may be a local intranet or the Internet. In some cases, the management applications 315 and the servers that they manage (i.e., the management servers 305) may be separated by large geographical distances.
Because the management servers 305 and the management applications 315 may reside on separate JVMs and/or different physical machines, the performance of the connection 325 may be orders of magnitude slower than the performance of a management application running on the same JVM or even the same physical machine. For example, if the management applications 315 are responsible for rendering GUI views to the system administrator 320 of various management servers 305 that are in different JVMs and/or physical devices, then the management applications 315 may have to wait for responses from each of the management servers 305 before rendering an accurate GUI of the status of the managed system 300. In this manner, as the size of the requests becomes smaller and smaller, the latency of the connection 325 may dominate the overall latency of the view rendered to the system administrator 320 regardless of the type of management client implemented (JMX, SNMP, etc.). Also, if for some reason there is a network outage and the connection 325 becomes unavailable then the status of the managed system 300 may be completely unavailable. In this scenario, the management applications 315 would also like to view a read-only view of the machine's previous state, and the timestamps of the last time when that state was known to be valid.
Some embodiments may implement a client-side cache connector 330 on the same JVM and/or physical machine as the management applications 315 and also implement a server-side cache connector 335 on the same JVM and/or physical machine as the managed system 300. The two cache connectors 330, 335 may form a management connection between the applications 315 and the system 300 such that no changes in the code are required in the client-side or the server-side other than to prefix the JMX service URL used for the connector 325 to indicate the use of a cached connection. In other words, a dynamic library on the client side may change, but the code on the client and server side may stay the same.
Notably, the processing required to implement the server-side cache connector 335 may be distributed across the entire managed system 335 rather than focused on a single machine, e.g., the JVM and/or physical machine on the client side implementing the management applications.
During operation, the server-side cache connector 335 may be implemented for each object that the managed servers 305 monitor. The server-side cached connector may store a local copy of certain objects being monitored (e.g., CPU utilization, disk usage, online status, network usage, and/or model number of the CPU), which may or may not be on separate JVMs and/or physical machines. Certain items may be classified in the cache connector 335 as unchanging with respect to time or read-only (such as a particular chipset installed in a sub-system). Other items may be classified in the cache connector 335 as changing with respect to time (operating temperature, processor load, etc.).
For items that do change with respect to time, a timestamp may be associated with each stored value. That is, along with sending the temperature of a particular physical machine, a timestamp of that particular temperature also may be stored in the client-side cache connector 330. In addition, for items that do change with respect to time, some embodiments include sending only differences between previous values and new values to be stored in the client-side cache connector 330 (sometimes referred to as “deltas”). This may allow a reduction in the overall bandwidth requirements of the network 325 when updating the client-side cache connector 330 to be consistent with values stored in the server-side cache connector 335, which may allow the most current information to be continually conveyed to the user 320 while minimizing bandwidth needs of the network 325. In some embodiments, these deltas may be conveyed to the client-side cache connector 330 together in bulk format.
The client-side cache connector 330 may receive copies of data from the server-side cache connector 335 asynchronously. In this manner, the management applications 315 that request managed data from the managed system 300 may not have to wait for synchronous communication between each of the management servers 305 and the management applications 315, which may be particularly desirable when each of the management servers 305 are in separate JVMs and/or physical machines that may be geographically distant from the management applications 315.
Also, by storing copies of the unchanging data from the server-side cache connector 335 in the client-side cache connector 330, unchanging items may be resolved locally by the client-side cache connector 335 such that access to the managed system 300 via the network 325 may be avoided, along with avoiding the latency that comes with accessing numerous items via the network 325.
Furthermore, in some embodiments, the client-side cache connector 330 may maintain a persisted copy of the cached data (changing and/or unchanging plus timestamps) such that when the management applications 315 provide remote management data more quickly on startup. For example, certain managed objects, like disk usage, may be required every five minutes. By implementing persistence in the client-side cache connector 330, a restart of the client-side cache connector 330 may occur more quickly because the disk usage may be substantially up to date and require only a few deltas.
Communication between the client cache connector 330 and the server cache connector 335 may occur via a feed, such as, the feed 40 described above in
One or more of the above described embodiments may be implemented as computer software in the form of computer readable code akin to exemplary computer source code listing submitted herewith. This code may be executed on a general purpose computer such as computer 500 illustrated in
Referring to computer system 500 shown in
Computer 500 may also include a video memory 514, a main memory 515 and a mass storage 512, all coupled to system bus 518 along with keyboard 510, mouse 511 and processor 513. Mass storage 512 may include both fixed and removable media, such as magnetic, optical or magnetic optical storage systems or any other available mass storage technology. Bus 518 may contain, for example, address lines for addressing video memory 514 or main memory 515. System bus 518 also includes, for example, a data bus for transferring data between and among the components, such as processor 513, main memory 515, video memory 514 and mass storage 512.
In some embodiments, processor 513 is a SPARC™ microprocessor from Sun Microsystems, Inc., or a microprocessor manufactured by Motorola, such as the 680XX0 processor, or a microprocessor manufactured by Intel, such as the 80X86, or Pentium processor. Any other suitable microprocessor or microcomputer may be utilized, however. Main memory 515 may include dynamic random access memory (DRAM), static random access memory (SRAM), magnetic random access memory (MRAM) or the like. Video memory 514 may be a dual-ported video random access memory. One port of video memory 514, in one example, is coupled to video amplifier 516, which is used to drive a monitor 517. Monitor 517 may be any type of monitor suitable for displaying graphic images, such as a cathode ray tube monitor (CRT), flat panel, or liquid crystal display (LCD) monitor or any other suitable data presentation device.
Computer 500 also may include a communication interface 520 coupled to bus 518. Communication interface 520 provides a two-way data communication coupling via a network link, such as network 25 or 110. For example, communication interface 520 may be an integrated services digital network (ISDN) card or a modem, a local area network (LAN) card, or a cable modem or wireless interface. In any such implementation, communication interface 520 sends and receives electrical, electromagnetic or optical signals which carry digital data streams representing various types of information.
Code received by computer 500 may be executed by processor 513 as it is received, and/or stored in mass storage 512, or other non-volatile storage for later execution. In this manner, computer 500 may obtain application code in a variety of forms. Application code may be embodied in any form of computer program product such as a medium configured to store or transport computer readable code or data, or in which computer readable code or data may be embedded. Examples of computer program products include CD-ROM discs, ROM cards, floppy disks, magnetic tapes, computer hard drives, servers on a network, and solid state memory devices.
The above discussion is meant to be illustrative of the principles and various embodiments of the present invention. Numerous variations and modifications will become apparent once the above disclosure is fully appreciated. In addition, the above description has broad application, and the discussion of any embodiment is meant only to be exemplary, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these embodiments.
Claims
1. A computer sub-system capable of being managed by a remote manager, the sub-system comprising:
- a processor;
- a communication interface coupled to the processor, the communication interface in communication with the remote manager via a network;
- a firewall implemented between the sub-system and the remote manager such that the firewall blocks access to the sub-system from the remote manager;
- a client manager to receive a configurable feed, wherein the client manager maintains a value indicative of a level of activity to be performed on the sub-system in response to the configurable feed, and wherein the client manager retrieves the configurable feed at a variable schedule based on the value; and
- wherein the sub-system executes commands to perform maintenance on the sub-system, the commands received from the remote manager via the configurable feed passing freely through the firewall without routing the commands through a management port of the firewall.
2. The computer sub-system of claim 1, wherein the commands are received in text format.
3. The computer sub-system of claim 2, wherein the text format includes extensible Markup Language (XML).
4. The computer sub-system of claim 1, wherein the configurable feed is a syndicated ATOM feed.
5. The computer sub-system of claim 4, wherein the configurable feed is saved to a webserver on an opposite side of the firewall as the sub-system.
6. The computer sub-system of claim 1, wherein the sub-system and the remote manager operate using different operating systems and the commands are parsed without specialized software.
7. The computer sub-system of claim 1, wherein the commands are read with a reader selected from the group consisting of an XML interpreter and a web browser.
8. The computer sub-system of claim 1, wherein the sub-system processes commands received from the configurable feed asynchronous to the operation of the remote manager.
9. The computer sub-system of claim 1, wherein the sub-system implements the commands received from the configurable feed and posts results of executing the commands back to the configurable feed.
10. The computer sub-system of claim 1, wherein the performed maintenance includes at least one of controlling particular software loaded on the sub-system, rebooting the sub-system, installing at least one software patch, and monitoring at least one operating condition for the sub-systems.
11. The computer sub-system of claim 1, wherein the value is incremented or decremented at a counter of the client manager.
12. A method for configuring one or more remote sub-systems, the method comprising the acts of:
- restricting direct commands to the one or more remote sub-systems from a remote manager using a firewall;
- posting one or more commands to perform maintenance on the one or more sub-systems to a configurable feed using the remote manager, the configurable feed passing freely through the firewall without routing through a management port of the firewall;
- reading the feed with a client manager that is coupled between the one or more sub-systems and the remote manager;
- determining with the client manager whether the configurable feed contains a particular command intended for the one or more sub-systems;
- incrementing a value indicative of a level of activity to be performed on the one or more sub-systems in response to the configurable feed when the configurable feed contains the particular command intended for the one or more sub-systems;
- adjusting a number of times the client manager reads the configurable feed based on the value indicative of the level of activity, and
- performing maintenance, with the client manager, on the one or more sub-systems according to the particular command.
13. The method of claim 12, wherein performing maintenance on the one or more sub-systems according to the particular command intended for the one or more sub-systems is completed prior to the client manager repeating the act of reading the feed.
14. The method of claim 12, wherein reading the feed includes reading the commands using a reader selected from the group consisting of an XML interpreter and a web browser.
15. The method of claim 12, further comprising:
- decrementing the value indicative of the level of activity for the one or more sub-systems in response to the configurable feed when the configurable feed does not contain the particular command intended for the one or more sub-systems.
16. A remote computer management system comprising:
- a remote manager;
- a managed system coupled to the remote manager via a firewall, wherein the firewall has been configured to disallow commands to be transmitted directly from the remote manager to the managed system;
- a configurable feed coupled to the remote manager, wherein the remote manager posts commands for the maintenance of the managed system to the configurable feed through the firewall in text format, wherein the configurable feed passes freely through the firewall without routing the commands through a management port of the firewall; and
- a client manager to monitor the configurable feed, perform the commands within the configurable feed, and maintain a value indicative of a level of activity to be performed on the managed system in response to the configurable feed, and wherein the client manager retrieves the configurable feed at a variable schedule based on the value.
17. The remote computer management system of claim 16, wherein the managed system further comprises a user interface and one or more sub-systems, the user interface configured to read the configurable feed to determine the status of the one or more sub-systems.
18. The remote computer management system of claim 17, wherein the user interface and the one or more sub-systems are located in geographically different locations.
19. The remote computer management system of claim 16, further comprising a feed reader selected from the group consisting of an XML interpreter and a web browser.
20. The remote computer management system of claim 17, wherein the configurable feed is conveyed via an ATOM feed format.
21. The remote computer management system of claim 16, wherein the client manager also adjusts a rate which it monitors the configurable feed based on information contained in the configurable feed.
22. The remote computer management system of claim 16, wherein the value is incremented or decremented at a counter of the client manager.
23. The remote computer management system of claim 16, wherein the value is incremented when the client manager performs the command contained in the configurable feed.
24. The remote computer management system of claim 16, wherein the value is decremented when the client manager does not perform the command contained in the configurable feed.
6023765 | February 8, 2000 | Kuhn |
6473800 | October 29, 2002 | Jerger et al. |
7356695 | April 8, 2008 | LiVecchi |
7546334 | June 9, 2009 | Redlich et al. |
7657925 | February 2, 2010 | Pesati et al. |
7716718 | May 11, 2010 | Asada et al. |
7895326 | February 22, 2011 | Jerrim et al. |
20020103903 | August 1, 2002 | Bruton et al. |
20050188321 | August 25, 2005 | Adams et al. |
20060265489 | November 23, 2006 | Moore |
20070113283 | May 17, 2007 | Hrabik et al. |
20070244895 | October 18, 2007 | Mohler et al. |
20080066172 | March 13, 2008 | Tarsi |
20090007126 | January 1, 2009 | Jelinek et al. |
20090089406 | April 2, 2009 | Roush et al. |
20100306534 | December 2, 2010 | Teijido et al. |
20110238984 | September 29, 2011 | Roush |
849680 | June 1998 | EP |
- Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated Dec. 3, 2014.
- Response to Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated Mar. 3, 2015.
- Final Office Action regarding U.S. Appl. No. 12/730,819, dated Mar. 11, 2015.
- Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated Feb. 26, 2014.
- Response to Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated May 27, 2014.
- Final Office Action regarding U.S. Appl. No. 12/730,819, dated Jun. 12, 2014.
- Response to Final Office Action regarding U.S. Appl. No. 12/730,819, dated Sep. 12, 2014.
- Advisory Action regarding U.S. Appl. No. 12/730,819, dated Sep. 19, 2014.
- System Administration Guide: Solaris Containers—Resource Management and Solaris Zones, published 2007.
- Faden, Glen, Solaris Trusted Extensions, Sun Microsystems, Apr. 2006.
- Brunette, Glenn and Victor, Jeff, Understanding the Security Capabilities of Soloris Zones Software, Sun Dec. 21, 2008.
- Oracle Solaris with Trusted Extensions, Oracle, Dec. 2007.
- Faden, Glenn, Comparing the Multilevel Security Policies of the Solaris Trusted Extensions and Red Hat Enterprises Linux Systems, Sun Microsystems, Feb. 2007.
- Faden, Glenn, Solaris Trusted Extensions and Red Hat Enterprise Linux: Multilevel Security Policy Feature Summary Comparison, Sun Microsystems, Feb. 2007.
- Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated Nov. 28, 2012.
- Amendment and Response to Non-Final Office Action regarding U.S. Appl. No. 12/730,819, dated Feb. 28, 2013.
- Final Office Action regarding U.S. Appl. No. 12/730,819, dated Mar. 13, 2013.
- Amendment and Response to Final Office Action regarding U.S. Appl. No. 12/730,819, dated Jun. 12, 2013.
- Advisory Action Before the Filing of an Appeal Brief regarding U.S. Appl. No. 12/730,819, dated Jun. 19, 2013.
Type: Grant
Filed: Jul 23, 2008
Date of Patent: Aug 11, 2015
Assignee: Oracle America, Inc. (Redwood City, CA)
Inventors: Nick Stephen (Saint Martin d'Uriage), Thierry Roussel (Meylan), Jean-Francois Denise (Biviers)
Primary Examiner: Jackie Zuniga Abad
Application Number: 12/178,358
International Classification: G06F 12/08 (20060101); H04L 29/08 (20060101);